Premium Essay

Comprehensive Set Of Policies And Procedures: Case Study

Submitted By
Words 581
Pages 3
Comprehensive Set of Policies and Procedures

Staff Consultation Staff consultation can be initiated for the following reasons:
1. Important changes intended be proposed by either the employer or the staff.
2. Any adjustment when it comes to the hours of work including the roster.
3. In the event termination or suspension is deem necessary.
4. Work health and safety is needed to be reviewed.
5. New agreements and working arrangements.

A. Direct consultation
Sharing of information thru face to face, telephone conversation, emails or written notes. This is a more confidential way of discussing sensitive matters.

B. Formal meetings
Conversation among the employees which is scheduled ahead of time and the issues tackled are being recorded and copies of minutes are provided.

Internal Communication Internal communication comprises both …show more content…
All communication must be addressed in accordance to the chain of hierarchy of position. Your direct supervisor must be aware of any concern or issue before it will be relayed to a much higher manager.
Channels of communication:
1. Staff bulletin
2. Staff emails
3. Social networks
4. Staff surveys

Cultural Diversity within the Workplace This policy applies to all employees, supervisors and managers. This aims to maintain humane, impartial and justifiable approach in encouraging, acknowledging and supporting diversity within the workplace. All staff members are obliged to possess and practice the necessary values of equity in employment such as ethical, respectful and impartial.

The following individual differences must be valued and respected:
1. Age
2. Gender
3. Language
4. Sexual orientation
5. Ethnicity
6. Cultural background
7. Religious belief
8. Disability
9. Marital status
10. Educational background
11. Socio-economic

Similar Documents

Premium Essay

Health Information

...record. (Complete for all that are listed in Abdelhak under the “health data users and uses” section. - Patient: uses their medical data to understand their health care and to become more active partners in maintain or improving their health. - Health care practitioners: uses it as a primary means of communications among themselves. - Health Care providers and Administrators: uses the data to evaluate care, monitor the use of resources, and receive payment for services rendered. Administrators analyze financial and patient case mix information for business planning and marketing activities - Third party payers: the data become the basis for determining the appropriate payment to be made. - Utilization and case managers: uses it to coordinate care so that the patient is cared for in the most clinically cost-effective manner. - Quality of care committees: use the information as a basis for analysis, study, and evaluation of the quality of care given to the patient. - Accrediting, licensing, and certifying agencies: use the record to provide public assurance that quality health care is being provided. - Governmental agencies and public health: to determine the appropriate use of the governmental financial resources for health care facilities and educational and correctional institutions - Health information exchanges: provides patient centered care that improves quality, safety, efficiency, timeliness and accessibility -...

Words: 3416 - Pages: 14

Premium Essay

Security Management Case Study #1

...SMT 320 Case Study #1 Kristian Lauren R. Martin November 6, 2011 Case Study #1 Building the Foundation – Security Assessments As the security manager of a major corporation tasked with creating the initial security assessment and auditing program for the company, the first step in developing proposals for the security services would be conducting a comprehensive survey (policies, procedures and operations) of the entire facility to identify the critical factors affecting the security of the premises (Broder, 2006). The next step would be to analyze the vulnerabilities and recommend protection which is cost-effective (Broder, 2006). To start, establishing policies and procedures which define the mission of the security department should be the bare minimum in the role of the security department. These would include the following: * Protection against internal and external theft (to prevent embezzlement, fraud, burglary, robbery, industrial espionage and theft of trade secrets and proprietary information) * Developing access-control procedures (to protect the perimeter of the facility and other sensitive areas) and anti-intrusion systems * Establishing lock-and-key control procedures * Establishing a workplace violence program * Controlling the movement of people on the premises * Reviewing security personnel hiring and deploying * Establishing emergency and disaster recovery plans * Identifying the resources needed and available for the security...

Words: 802 - Pages: 4

Free Essay

Fly Ash Utilization in China

...Market  Landscape  and  Policy  Analysis     Fly  Ash  U)liza)on  in  China   October  2010   1.  China fly ash utilization overview 2.  Drivers of fly ash utilization and relevant policy development trends 3.  Big 5 independent power producers China  fly  ash  u5liza5on  overview:   a  long  history  of  fly  ash  u5liza5on   1950s   China  begins  u5lizing  fly  ash,  mainly  in  the  construc5on  sector  as  concrete  admixture,  and   par5cularly  in  the  construc5on  of  hydropower  sta5ons China  begins  u5lizing  fly  ash  as  walling  material,  including  blocks,  wallboard,  baked  bricks,   and  ceramsite   The  government  starts  rolling  out  a  series  of  incen5ve  policies  for  fly  ash  u5liza5on  in   various  sectors  such  as  building  materials,  construc5on,  backfill,  agriculture,  etc.     The  State  Development  and  Planning  Commission1  releases  the  “China  Fly  Ash  U5liza5on   Technology  Policy  and  Implementa5on  Roadmap”   “Administra5ve  Measures  of  Fly  Ash  U5liza5on”  is  released  by  State  Economic  and  Trade   Commission2,  Ministry  of  Electric  Power  Industry3...

Words: 3192 - Pages: 13

Premium Essay

Humen Resource Manegment

...Human Resource Management Review 23 (2013) 105–113 Contents lists available at SciVerse ScienceDirect Human Resource Management Review journal homepage: www.elsevier.com/locate/humres Human resource information systems: Information security concerns for organizations Humayun Zafar ⁎ Department of Information Systems, Kennesaw State University, 1000 Chastain Road, MD 1101, Kennesaw, GA 30144, United States. a r t i c l e i n f o Keywords: Human resource information system Information security Information privacy Security policies Security legislation Security architecture Security training Risk analysis a b s t r a c t We explore HRIS and e-HR security by presenting information security fundamentals and how they pertain to organizations. With increasing use of enterprise systems such as HRIS and e-HR, security of such systems is an area that is worthy of further exploration. Even then, there is surprisingly little research in this area, albeit that extensive work is present in regard to HRIS privacy. While focusing on HRIS and e-HR security, we introduce aspects of HRIS and e-HR security and how it can be enhanced in organizations. A research model is also presented along with propositions that can guide future research. © 2012 Elsevier Inc. All rights reserved. 1. Introduction A human resource information system (HRIS) is an integrated computerized system used to acquire, store, manipulate, analyze, retrieve, and distribute pertinent...

Words: 7376 - Pages: 30

Premium Essay

Credit Risk Management

...CREDIT RISK MANAGEMENT Banks are in the business of risk management and, hence, are incentivized to develop sophisticated risk management systems. The basic components of risk management system are identifying the risks the bank is exposed to, assessing their magnitude, monitoring them, controlling/mitigating them using a variety of procedures and setting aside capital for potential losses. RBI prescribed risk management framework in terms of: a) Asset-Liability Management practices. b) Credit Risk Management. c) Operational Risk Management. d) Stress testing by Indian Banks in the perspective of international practices. BANKING RISKS: It can be categorized into: i) Business-related Risks. ii) Capital-related Risks. Business Related Risks: The business related risks to which banks are exposed are associated with their operational activities and market environment. They fall into six categories: namely, a) Credit Risk b) Market Risk c) Country Risk d) Business Environment Risk e) Operational Risk f) Group Risk Note: Market Risk comprising of interest rate risk, foreign exchange risk, equity price risk; commodity price risk and liquidity risk; Credit Risk: Credit risk, a major risk faced by banks, is inherent to any business of lending funds to individuals, corporate, trade, industry, agriculture, transport, or banks/financial institutions. It is defined as the possibility of loses associated with a diminution in the credit...

Words: 4669 - Pages: 19

Free Essay

New Polictics

...debates. WERS logo Acas is proud to co-sponsor the Workplace Employment Relations Study (WERS), a national survey of people at work in Britain. It is the flagship survey of employment relations in Britain. WERS has been undertaken six times; most recently in 2011 (reporting in 2013). A full range of WERS-related materials, information and advice, including a bibliography of secondary analysis, is available at the official WERS website: www.wers2011.info. Keep up to date with Acas policy and research news and publications The Acas Blog: Read and comment on views, experiences and insights on employment relations policy and research shared on the Acas policy blog Subscribe to policy and research email updates: Sign up to email updates of articles, policy discussion papers, and the latest research from the Acas Strategy Unit and the Research and Evaluation Section. We will not share your contact information with any external organisations. View our full Acas privacy policy for further information. Research papers 2015 •pdf Arbitration in collective disputes: A useful tool in the toolbox [819kb] Ref: 05/15 This report outlines the findings from the evaluation of Acas' Arbitration service. The research covers qualitative interviews with 13 users of the service, including Acas arbitrators, conciliators, employers and union representatives. The research showed that the numbers of cases have declined in recent years, but users continue to welcome it as an alternative...

Words: 1746 - Pages: 7

Premium Essay

Ifrs Paper

...access ordering information. Course Description (Students should be cautious about enrolling in ACCT 310 or ACCT 311. These are professional courses requiring intensive study and analysis and are not to be undertaken casually. Students who have not taken ACCT 221 within the last two years may have difficulty.) Prerequisites: BMGT 110 (or at least two years of business or management experience) and ACCT 221. A comprehensive analysis of financial accounting topics involved in preparing financial statements and in external reporting. Students may receive credit for only one of the following courses: ACCT 310 or BMGT 310. Course Goals/Objectives This course should help you develop the ability to apply GAAP to a variety of complex accounting and financial reporting situations. The specific goals of this course are to: • provide a more extensive understanding of financial accounting principles and procedures and their role in the managerial decision-making process, through (a) the textbook and other written materials, (b) discussion of accounting topics via Web conferencing and online case study assignments, (c) research on the World Wide Web, and (d) FARS / Financial Accounting Research System • present financial accounting processes, procedures, terminology, concepts, and case studies • provide a higher level of problem-analysis and problem-solving ability through the use of CPA-level professional accounting materials After completing this course, you should...

Words: 1838 - Pages: 8

Premium Essay

Health and Safety Management Systems Archive

...SYSTEMS PART TWO: CASE EVIDENCE 3.3 SYSTEM TYPES - CASE STUDY FINDINGS 3.4 SUMMARY 4. ASSESSING HEALTH AND SAFETY MANAGEMENT SYSTEM EFFECTIVENESS PART ONE: LITERATURE AND FRAMEWORK FOR ASSESSMENT 4.1 INTRODUCTION 4.2 LITERATURE ON EFFECTIVENESS OF HEALTH AND SAFETY MANAGEMENT SYSTEMS PART TWO: CASE EVIDENCE 4.3 THE TWENTY CASES: CONTENT AND LEVEL OF DEVELOPMENT OF HEALTH AND SAFETY MANAGEMENT SYSTEMS 4.4 THE TWENTY CASES: OUTCOME DATA 4.5 SUMMARY 5. FACTORS SHAPING PERFORMANCE AND THE ROLE OF SYSTEM TYPE 5.1 INTRODUCTION 5.2 BASICS AND EXTRAS 5.3 SYSTEM-RELATED CHARACTERISTICS 5.4 THE ROLES OF THE KEY WORKPLACE PLAYERS 5.5 THE LINKAGES BETWEEN HEALTH AND SAFETY PERFORMANCE AND SYSTEM TYPE 5.6 SUMMARY 6. CONCLUSIONS REFERENCES APPENDIX ONE: CASE STUDY PROTOCOL APPENDIX TWO: ASSESSMENT CRITERIA APPENDIX THREE: CASE SUMMARIES AND SYSTEM TYPES Executive Summary This report examines planned approaches to health and safety management in the workplace. It is the result of a two-year study of enterprise-level health and safety management systems, funded by Worksafe Australia, and conducted from late 1994 to late 1996. The need for research on health and safety management systems arises from the intensive promotion of and apparent increasing interest at enterprise level in health and safety management systems. The need is underlined by limited research on the efficacy of health and safety management systems and alternative systems. In this study, a health and safety...

Words: 97784 - Pages: 392

Premium Essay

Role of Project Management Information Systems in Project Management.

...ROLE OF PROJECT MANAGEMENT INFORMATION SYSTEMS IN PROJECT MANAGEMENT. INTRODUCTION 1. Background of Management Information Systems The concept of Management information system (MIS) has been in existence as early as the 19th Century. Works of majorly were in the form of tabulated cards which could be counted and sorted commonly referred to us punch – cards. The punch-cards still remembered by many, could capture elements of information keyed in on punch-card machines; the cards were then processed by other machines some of which could print out results of tallies. Each card was the equivalent of what today would be called a database record, with different areas on the card treated as fields.  The initial idea of MIS was to process data from the organization and present it in the form of reports at regular basis. The system was largely capable of handling the data from collection to processing. It was more impersonal requiring each individual to pick and choose the processed data and use for his requirements. This concept was further modified when a distinction was made between data and information. Information is a product of analysis of data. However the data could be analyzed in different ways producing different shades and specification of information as a product. It therefore demanded that the system concept be an individual oriented since each individual has different orientation. This concept was further modified that the system should present information in such...

Words: 2073 - Pages: 9

Premium Essay

Anti Money Laundering

... Code and Title: Business Research GEMA6160 | Lecturer: Professor Jason Marshall | | Student ID: | 3/28/2014 | | RESEARCH TOPIC: Preventing Money Laundering: An assessment of an indigenous and a International Bank operating in Antigua and Barbuda Table of Contents Executive Summary…………………………………………………………………………………………………………………………3 Introduction……………………………………………………………………………………………………………………………………4 Background………………………………………………………………………………………………………………………..5 Rationale……………………………………………………………………………………………………………………..…….5 Purpose of Study………………………………………………………………………………………………………………..6 Literature Review…………………………………………………………………………………………………………………………...6 Methodology………………………………………………………………………………………………………………………….………9 Research Design………………………………………………………………………………………………………………..9 Participants……………………………………………………………………………………………………………………….9 Material…………………………………………………………………………………………………………………………….9 Procedures………………………………………………………………………………………………………………………..10 Limitations…………………………………………………………………………………………………………………………11 Presentation of Findings…………………………………………………………………………………………………………………15 Analysis of Findings………………………………………………………………………………………………………………..………17 Recommendations………………………………………………………………………………………………………………………...18 Conclusion……………………………………………………………………………………………………………………………………..19 References……………………………………………………………………………………………………………………………………..20 Appendices…………………………………………………………………………………………………………………………….………21 Appendix A………………………………………………………………………………………………………………………...

Words: 4491 - Pages: 18

Premium Essay

Dbms

...Lovely Professional University Case study on student record keeping system Name Abhishek Bhatt Regd. No. 11109390 Roll No. A21 Section K1104 Submittked By Submitted to Abhishek Bhatt Vipin Kumar Case Study case study on student record keeping system Table Of Content 1) Introduction 2) What is DBMS ? 3) Features/Advantages of DBMS. 4)Disadvantages of DBMS 5)Advantages of student record keeping system 6)Note * Introduction : * DBMS : DBMS Stands for Data Base Management System. It consists of interrelated data and set of programs to access those data. * Data : Raw information is called data. * Database : Database is a collection of interrelated data, contain information about one particular enterprise. * Interrelated Data : It is a type of data which is related to each other. e.g. Student and subject, parents and child. * About My Topic : My topic is about case study on student record keeping system * Introduction to case student record keeping system Student Record Keeping System is a comprehensive solution for all of a school’s student management needs, like enrollment...

Words: 1384 - Pages: 6

Free Essay

Essay

...Energy flow is tracd through the system operation & energy transfer points are identifid– Barriers to ento energy flow are evaluatd to determine adequacy • ETBA process can be applied at any stage of the project lifecycle & can be very useful for:– Systems design –Developing procedures(e.g., lockout--‐tagout). – Planning/judging operational readiness. – During mishap investigation or making “safe--‐to--‐enter” decisions at mishap sites. ETBA Approach • Examine system & identify all energy sources • For each energy source, trace its path through the system • Identify all targets tht could be vulnerable to the energy source • Identify all barriers in the energy flow path • Determine if existing controls are adequate. Energy Source– any material, mechanism, or process tht contains potential energy tht can be releasd •Electrical •Mechanical •Chemical •Radiation• Sonic• Thermal• Nuclear• Pneumatic• Hydraulic• Others Energy barrier --‐ any design or administrative method tht prevents energy from being releasd or prevents a hazardous energy source from reaching a vulnerable target in sufficient magnitude to cause damage or injury • Walls guardrails • Insulation • Toe boards• Shielding• Hard hats• Barricades • Procedures • Lockout/Tagout • Others Target(s)– Personnel– Equipment– Product– Productivity– Environment– Reputation– Others. Note: Unwantd energy release from a single Source may attack multiple Targets. Strategies for Managing Harmful Energy...

Words: 2026 - Pages: 9

Free Essay

Mining Code of Germany

...MINING A.1. POLICY AND REGULATIONS A.1.1. FEATURES OF NATIONAL MINING CODES OR MINERAL INDUSTRY CODE The main feature of German mining legislation is its comprehensive structure, implementing integrated risk prevention through an intermedia approach with strict requirements on concessions, health and safety, environment and other issues as well as differentiated mechanisms for compliance and monitoring. This approach directly implements the challenges of the concept of sustainable development, taking into consideration the three pillars of environmental protection, social development and economic development, with each of these three policy areas being mutually supportive of the others. Mining legislation in Germany consists of the Federal Mining Act of 1980 and a number of Mining Ordinances on technical and procedural issues, e.g. the Federal General Mining Ordinance of 1995, the Health and Safety Mining Ordinance of 1991, the Ordinance on the Environmental Impact Assessment of Mining Projects of 1990. These provisions set up a uniform mining law for all important mineral resources in the form of a comprehensive law covering all aspects of mining, including health and safety and environment, supervised by one single administration (one-stop shop). This comprehensive system has been strengthened in the past 30 years several times with the transferring into national German legislation of new European legislation on concessions, environment and health and safety in the extractive...

Words: 2460 - Pages: 10

Premium Essay

Project

...containing sensitive material that results in the potential compromise of the confidentiality, integrity, or availability. “An information security program begins with policy, standards, and practices, which are the foundation for the information security architecture and blueprint. In order for an organization’s information security program to succeed. It will need to “operate in conjunction with the organization’s established security policy.” (Whitman & Mattord, 2012) This case study will discuss the legal environment for an organization, which includes policies, regulations, and laws. Also, it will illustrate how these factors impact an organization to ensure the confidentiality, integrity, and availability of information and information systems. Foremost, in any organization, confidentiality, integrity, and availability (CIA triad) is the model which is supposed to guide information security policies that are established. Policies play an important role in any organization. They “direct how issues should be addressed and technologies should be used.” (Whitman & Mattord, 2012) As Information security practitioners, we use government and organizational policies as our stepping stones or foundational material to establish a rock solid information security program. In information security, government policies are issued by federal, state, local,...

Words: 1779 - Pages: 8

Premium Essay

What Is Basel Ii

...endorsed by the Central Bank Governors and Heads of Banking Supervision of the Group of Ten countries. It presents the outcome of the Basel Committee on Banking Supervision’s work over recent years to secure international convergence on revisions to supervisory regulations governing the capital adequacy of internationally active banks. Following the publication of the Committee’s first round of proposals for revising the capital adequacy framework in June 1999, an extensive consultative process was set in train in all member countries and the proposals were also circulated to supervisory authorities worldwide. The Committee subsequently released additional proposals for consultation in January 2001 and April 2003 and furthermore conducted three quantitative impact studies related to its proposals. As a result of these efforts, many valuable improvements have been made to the original proposals. The present paper is now a statement of the Committee agreed by all its members. It sets out the details of the agreed Framework for measuring capital adequacy and the minimum standard to be achieved which the national supervisory authorities represented on the Committee will propose for adoption in their respective countries.  The Basel Committee on Banking Supervision is a committee of banking supervisory authorities that was established by the central bank governors of the Group of Ten countries in 1975. It consists of senior representatives of bank supervisory authorities and central...

Words: 1645 - Pages: 7